ID

VAR-200212-0120


CVE

CVE-2002-2053


TITLE

Cisco counterfeit HSRP Loop Rejection Service Vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-200212-274

DESCRIPTION

The design of the Hot Standby Routing Protocol (HSRP), as implemented on Cisco IOS 12.1, when using IRPAS, allows remote attackers to cause a denial of service (CPU consumption) via a router with the same IP address as the interface on which HSRP is running, which causes a loop. IOS is the Internet Operating System, used on Cisco routers. It is distributed and maintained by Cisco. Hot Standby Routing Protocol (HSRP) is a protocol used to allow multiple routers to dynamically act as backups in the event of router failure. HSRP traffic takes place over UDP port 1985. A vulnerability has been reported in some versions of IOS. It may be possible for maliciously constructed HSRP traffic to create a loop condition, resulting in a denial of service attack. It has been reported possible to cause this condition in version 12.1 of IOS. Other versions of IOS may share this vulnerability, this has not however been confirmed. This issue has been assigned Cisco Bug ID CSCdu38323. CISCO's HSRP protocol itself has design problems, which can lead to denial of service attacks by attackers on the local network. The HSRP protocol does not have a strict security verification mechanism, and the router communication on the network is not checked correctly. The attacker can set the loop interface address on the active router. When the virtual router is advertised through the HSRP protocol, the loop interface is directly used. resulting in a denial of service. This attack can only work on the local network because most routers do not forward the address (224.0.0.2) that is multicast to all routers

Trust: 1.26

sources: NVD: CVE-2002-2053 // BID: 4949 // VULHUB: VHN-6436

AFFECTED PRODUCTS

vendor:ciscomodel:iosscope:eqversion:12.1

Trust: 1.9

sources: BID: 4949 // CNNVD: CNNVD-200212-274 // NVD: CVE-2002-2053

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2002-2053
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-200212-274
value: MEDIUM

Trust: 0.6

VULHUB: VHN-6436
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2002-2053
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-6436
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-6436 // CNNVD: CNNVD-200212-274 // NVD: CVE-2002-2053

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2002-2053

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200212-274

TYPE

Design Error

Trust: 0.9

sources: BID: 4949 // CNNVD: CNNVD-200212-274

EXTERNAL IDS

db:BIDid:4949

Trust: 2.0

db:NVDid:CVE-2002-2053

Trust: 1.7

db:CNNVDid:CNNVD-200212-274

Trust: 0.7

db:XFid:9283

Trust: 0.6

db:BUGTRAQid:20020605 THREE POSSIBLE DOS ATTACKS AGAINST SOME IOS VERSIONS.

Trust: 0.6

db:BUGTRAQid:20020606 RE: THREE POSSIBLE DOS ATTACKS AGAINST SOME IOS VERSIONS.

Trust: 0.6

db:NSFOCUSid:2956

Trust: 0.6

db:VULHUBid:VHN-6436

Trust: 0.1

sources: VULHUB: VHN-6436 // BID: 4949 // CNNVD: CNNVD-200212-274 // NVD: CVE-2002-2053

REFERENCES

url:http://www.securityfocus.com/bid/4949

Trust: 1.7

url:http://archives.neohapsis.com/archives/bugtraq/2002-06/0027.html

Trust: 1.7

url:http://archives.neohapsis.com/archives/bugtraq/2002-06/0050.html

Trust: 1.7

url:http://www.iss.net/security_center/static/9283.php

Trust: 1.7

url:http://www.nsfocus.net/vulndb/2956

Trust: 0.6

url:http://www.cisco.com/en/us/products/sw/voicesw/ps4625/index.html

Trust: 0.3

sources: VULHUB: VHN-6436 // BID: 4949 // CNNVD: CNNVD-200212-274 // NVD: CVE-2002-2053

CREDITS

Andrew Vladimirov※ andrew@arhont.com

Trust: 0.6

sources: CNNVD: CNNVD-200212-274

SOURCES

db:VULHUBid:VHN-6436
db:BIDid:4949
db:CNNVDid:CNNVD-200212-274
db:NVDid:CVE-2002-2053

LAST UPDATE DATE

2024-08-14T13:51:26.091000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-6436date:2008-09-05T00:00:00
db:BIDid:4949date:2002-06-05T00:00:00
db:CNNVDid:CNNVD-200212-274date:2005-10-20T00:00:00
db:NVDid:CVE-2002-2053date:2008-09-05T20:32:12.493

SOURCES RELEASE DATE

db:VULHUBid:VHN-6436date:2002-12-31T00:00:00
db:BIDid:4949date:2002-06-05T00:00:00
db:CNNVDid:CNNVD-200212-274date:2002-06-05T00:00:00
db:NVDid:CVE-2002-2053date:2002-12-31T05:00:00